Progress in Cryptology. Africacrypt 2010
Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
Подобные документы
The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.
статья, добавлен 14.01.2017The modern computer technologies. Drawing of clock-pulse generator that from pulse sequence for all programming system. Engineering graphics OrCAD Capture. Projecting and design of principal schemes in electronics, microelectronics and electrotechniques.
книга, добавлен 11.10.2014The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.
статья, добавлен 08.06.2024Представлена атака по сторонним каналам на алгоритм аутентификации в сетях GSM. Рассмотрены варианты ее улучшения с помощью комбинации нескольких атак по сторонним каналам. Распределенная атака на COMP128 (алгоритм аутентификации в GSM-стандарте).
статья, добавлен 15.01.2019Computational and Mathematical Preliminaries: computability, complexity, intractability. Efficient Number-Theoretic Algorithms and Intractable Problems. Public-Key Cryptography and Type Crytposystems. Integer Factorization and Discrete Logarithm Attacks.
книга, добавлен 08.03.2014In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.
книга, добавлен 21.03.2014Рассмотрение характеристик для сравнения систем управления базами данных: индексов, встроенных языков программирования, поддержки триггеров и хранимых процедур. Ознакомление с особенностями Lotus Domino, DB2 Universal Database, Progress, UniVerse.
презентация, добавлен 21.02.2016Discriminating computer graphics images with hidden Markov tree model. Detection of tampering inconsistencies on mobile photos. Robust audio watermarking by using low-frequency histogram. A reversible acoustic steganography by integrity verification.
учебное пособие, добавлен 08.03.2014Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
статья, добавлен 19.07.2020Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
статья, добавлен 23.06.2016Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
статья, добавлен 08.06.2024The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
статья, добавлен 15.09.2012The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014Создание программы для закрашивания рисунка с заданием цвета из палитры цветов с помощью Библиотеки Визуальных Компонент VCL (Visual Component Library). Функции и процедуры модуля Graphics. Работа с отдельными точками растра, рисование сплошных объектов.
лабораторная работа, добавлен 28.10.2013An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014- 70. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
статья, добавлен 13.01.2017 - 71. Use of Pixlr cloud graphics editor in the course of computer science teacher professional training
The introduction of new cloud technologies in the educational process is a priority for domestic education. The selection of appropriate services that can be used to improve the educational process remains the key issue in solving these problems.
статья, добавлен 23.06.2022 Історія еволюції швидкісних показників жорстких дисків. Сутність методу циклічного надмірного контролю з утворюючим 32-бітним поліномом, який використовується при передачі даних. Способи підвищення пропускної спроможності інтерфейсу Parallel ATA.
контрольная работа, добавлен 23.09.2017Investigation of polygonal meshes to represent objects in systems of computer-aided design and computer graphics. Use the method of the voting tensor to isolate in the geometric structures the sparsities, irregularities and possible sources of noise.
статья, добавлен 28.09.2016Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
учебное пособие, добавлен 08.03.2014